Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Checkpoint and ISA design

Posted on 2010-08-20
2
Medium Priority
?
455 Views
Last Modified: 2013-11-16
Hi,

I have a checkpoint firewall and ISA 2004 server and I want to implement a front end backend design.

I was think of putting CP External facing Internet and ISA as the backend,

ISA-------CP--------Internet

Any advice of on this ?
0
Comment
Question by:skywalker101
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 18

Accepted Solution

by:
deimark earned 2000 total points
ID: 33487973
Either way works well here as the external firewall, however, I tend to prefer the CP FW on the perimeter and ISA on the inside.

Although ISA is a good firewall in itself, I prefer to use a purpose built firewall on the outside and use ISA on the inside.  You can utilise more of the perimeter protections on CP, like the IPS blade etc

Key things to take into account for traffic and rules is where you are doing NAT.  I would pick either CP or ISA to be the master NAT device as natting on each side does add to confusion when debugging any issues

HTH
0
 

Author Comment

by:skywalker101
ID: 33490657
Yea Checkpoint will be my master natting device as I find there is a lot more functionality with CP over iSA.
0

Featured Post

New benefit for Premium Members - Upgrade now!

Ready to get started with anonymous questions today? It's easy! Learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like regular user of computer nowadays, a good bet that your home computer is on right now, all exposed to world of Internet to be exploited by somebody you do not know and you never will. Internet security issues has been getting worse d…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Visualize your data even better in Access queries. Given a date and a value, this lesson shows how to compare that value with the previous value, calculate the difference, and display a circle if the value is the same, an up triangle if it increased…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

704 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question